"...possible to distinguish most of the programs which the computer was
running, and in some of them it was possible to distinguish between the
acoustic signature of different RSA secret keys (signing or decryption),
and fully extract decryption keys, by measuring the sound the machine
makes during decryption of chosen ciphertexts.
...All you need is a mobile phone placed at 20-30 cm from the computer
you want to hack."
www.zmescience.com/research/inventions/hack-cpu-sound-acoustic-19112013
Johny Radio
Stick It In Your Ear!
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.noisebridge.net/pipermail/noisebridge-discuss/attachments/20131222/c4abbd88/attachment.html>